![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
26th ISC 2023: Groningen, The Netherlands
- Elias Athanasopoulos, Bart Mennink:
Information Security - 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings. Lecture Notes in Computer Science 14411, Springer 2023, ISBN 978-3-031-49186-3
Privacy
- Manel Slokom, Peter-Paul de Wolf, Martha A. Larson:
Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense Against Model Inversion Attacks. 3-23 - Pronaya Prosun Das
, Despina Tawadros
, Lena Wiese
:
Privacy-Preserving Medical Data Generation Using Adversarial Learning. 24-41 - Bingchang He
, Atsuko Miyaji
:
Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning. 42-56
Intrusion Detection and Systems
- Songyue Chen
, Rong Yang, Hong Zhang, Hongwei Wu, Yanqin Zheng, Xingyu Fu, Qingyun Liu:
SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection. 59-78 - Yan Lin Aung
, Shanshan Wang
, Wang Cheng
, Sudipta Chattopadhyay
, Jianying Zhou
, Anyu Cheng
:
VNGuard: Intrusion Detection System for In-Vehicle Networks. 79-98 - Wei Chen, Huaijin Wang
, Weixi Gu, Shuai Wang:
RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing. 99-118
Machine Learning
- Hailong Hu
, Jun Pang
:
Loss and Likelihood Based Membership Inference of Diffusion Models. 121-141 - Blerta Lindqvist
:
Symmetry Defense Against CNN Adversarial Perturbation Attacks. 142-160
Web Security
- Nico Weidmann, Thomas Barber
, Christian Wressnegger
:
Load-and-Act: Increasing Page Coverage of Web Applications. 163-182 - Valerio Bucci
, Wanpeng Li
:
From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions. 183-202
Mobile Security and Trusted Execution
- David A. Tomassi
, Kenechukwu Nwodo
, Mohamed Elsabagh
:
Libra: Library Identification in Obfuscated Android Apps. 205-225 - Fatemeh Nezhadian
, Enrico Branca
, Natalia Stakhanova
:
Certificate Reuse in Android Applications. 226-245 - Gilang Mentari Hamidy
, Sri Yulianti
, Pieter Philippaerts
, Wouter Joosen
:
TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments. 246-264
Post-Quantum Cryptography
- Johanna Henrich
, Andreas Heinemann
, Alexander Wiesmaier
, Nicolai Schmitt
:
Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics. 267-287 - Lingjia Meng, Yu Fu, Fangyu Zheng, Ziqiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin:
Protecting Private Keys of Dilithium Using Hardware Transactional Memory. 288-306
Multiparty Computation
- Luke Harmon
, Gaetan Delavignette
:
Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals. 309-326 - Naty Peter:
Evolving Conditional Disclosure of Secrets. 327-347
Symmetric Cryptography
- Yukihito Hiraga, Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size. 351-371 - Jiqiang Lu, Xiao Zhang:
Impossible Differential Cryptanalysis of the FBC Block Cipher. 372-391 - Benqiang Wei
, Ruida Wang
, Zhihao Li
, Qinju Liu
, Xianhui Lu:
Fregata: Faster Homomorphic Evaluation of AES via TFHE. 392-412
Key Management
- Li Duan
, Yong Li, Lijun Liao:
Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography. 415-434 - Li Duan
, Yong Li:
On the Privacy-Preserving Infrastructure for Authenticated Key Exchange. 435-454 - Colin Boyd, Elsie Mestl Fondevik, Kristian Gjøsteen, Lise Millerjord:
Hybrid Group Key Exchange with Application to Constrained Networks. 455-472
Functional and Updatable Encryption
- Jodie Knapp
, Elizabeth A. Quaglia
:
Dynamic Multi-server Updatable Encryption. 475-495 - Qiuwei Zheng
, Jun Zhao
:
Trace-and-Revoke Quadratic Functional Encryption. 496-515 - Ming Wan, Geng Wang, Shifeng Sun, Dawu Gu:
Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings. 516-534
Signatures, Hashes, and Cryptanalysis
- Keyang Liu
, Xingxin Li
, Tsuyoshi Takagi:
Robust Property-Preserving Hash Meets Homomorphism. 537-556 - Xin Liu
, Joonsang Baek
, Willy Susilo
:
Withdrawable Signature: How to Call Off a Signature. 557-577 - Yu Wei
, Lei Bi, Kunpeng Wang, Xianhui Lu:
An Improved BKW Algorithm for Solving LWE with Small Secrets. 578-595
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.